netcat Johannes Franken
|
|
- Nickolas Douglas
- 6 years ago
- Views:
Transcription
1 netcat Johannes Franken On this page I show example uses of netcat - a command line tool to create network connections over tcp or udp. Contents 1. Intended purpose 2. Usage as client a) Querying webservers b) Forwarding ports c) Talking to mailrelays d) Determining a remote DNS server s software 3. Usage as server a) Remote shell demon b) Capturing network traffic c) Copying directory trees over some internet 4. Usage as portscanner 5. Links to advanced topics Intended purpose With netcat you can talk to arbitrary tcp- or udp-connections via stdin/out, e.g. from a shellscript. netcat can either setup the connections itself (client-mode): or answer them (server-mode): Additionally netcat s client-mode can be used as a portscanner. The following documentation correlates to netcat 1.10 from , which still is the most up to date version today (2003). Page: 1
2 Page: 2
3 Usage as client Querying webservers Try it yourself: When you query a webserver using shell redirection, telnet won t wait for the server s response, but abort the connection at the end of it s input: $ printf GET / HTTP/1.0\n\n telnet 80 Trying Connected to localhost. Escape character is ^]. Connection closed by foreign host. $ netcat performs better: $ printf GET / HTTP/1.0\n\n nc -w HTTP/ OK Server: thttpd/2.21b 23apr2001 Content-Type: text/html; charset=iso [...] <HTML> [...] </HTML> netcat will quit on the time when the connection closes down. the BTW: The parameter -w 10 makes sure, that this happens maximum 10 seconds the after the the input has ended. Forwarding ports With netcat and inetd you can forward local ports to other hosts. The following line in /etc/inetd.conf on host2 will locally provide host 3 s port stream tcp nowait nobody /usr/bin/nc /usr/bin/nc -w 3 host3 80 If you like logging and access control, you can change the first /usr/bin/nc to /usr/sbin/tcpd. Talking to mailrelays In my talk about ssh-tunnelling you can see a config file for exim, which forwards mails to certain domains over a mail relay using ssh and netcat: Page: 3
4 # at bottom of TRANSPORT CONFIGURATION : ########################### # Transport, which tunnels mails over ssh to my smarthost ssh: driver = pipe # talk regular smtp to the pipe (qmail approved :-) ) bsmtp = all bsmtp_helo = true use_crlf = true prefix = " suffix = " # connect to my mail server s smtp port. # must authenticate without password command = ssh johannes.our-isp.org netcat -w 1 localhost smtp user = jfranken # ssh failure handling: kill hanging sessions, # retry and tell me on failures timeout = 300s temp_errors = 1 return_fail_output = true # at top of ROUTERS CONFIGURATION: ########################### t_online: driver = domainlist transport = ssh route_list = "^t-online\.(de at com) t-dialin\.net$ ;\ ^mail.com$ ;\ ^lists.sourceforge.net$ ;\ ^bigpond.com$ ;\ ^aol.com$ ;\ ^mathematik.tu-darmstadt.de$ ;" The interesting point about this configuration is the cognition, that I can use any host, for which I have ssh access, as a mail relay. Determining a remote DNS server s software You can remotely determine the software a remote DNS server is running on: $ version.bind. txt CHAOS grep -i "^V" VERSION.BIND. 0S CHAOS TXT "BIND 8.3.4" Of course, you can also do that with bash and netcat: $ whatdns() { printf begin-base \np8ibaaabaaaaaaaab3zlcnnpb24eymluzaaaeaadcg==\n==== uudecode nc -uw 1 $1 domain strings tail -1; } $ whatdns pns.dtag.de BIND $ whatdns Page: 4
5 Usage as server When you type PROGRAM nc -l -p PORT -w TIMEOUT or nc -l -p PORT -w TIMEOUT PROGRAM 1. netcat will wait for exactly one connection to port PORT, then 2. attach to PROGRAM s out- or input and 3. wait maximum TIMEOUT seconds for the connection to abort. For ports below 1024, you need to be root. If the port should be bidirectional (do input as well as output), you can type nc -l -p PORT -e PROGRAM Unfortunately netcat cannot pass parameters to PROGRAM, so you might need to supply a 2-lines shellscript in most cases. Because netcat quits at the end of the connection, it can only service one connection. Use the following 3-lines shellscript, if you want netcat to accept multiple (successive or concurrent) sessions: $ cat << EOF >mydemon #!/bin/bash export port=${port:-$1} # inherit $1 as $port nc -l -p $port -e $0 & # await further connections on this port [ $1 ] PROGRAM # do the work (not for the first invocation) EOF $ chmod +x mydemon $./mydemon 3000 $ The -e parameter will only work, if netcat has been compiled with the option -DGAPING_SECURITY_HOLE set. For Debian GNU/Linux 3.0, this is true. Remote shell demon With the following shellscript, you can start your personal remote shell demon: Page: 5
6 #!/bin/bash # pershd - personal shell demon # Johannes Franken - jfranken@jfranken.de # on first invocation, export $PW and $port to subshells export PW port if [ $1 ] ; then port=$1 echo -n pass: read PW fi # do we know the port to listen on? if [! $port ]; then echo USAGE: $0 port ; exit; fi # wait for further connections (veiling params) echo "-l -p $port -e $0" nc 2>/dev/null & [ $1 ] && exit; # first invocation exit here # ask for password unset p until [ "$p" = "$PW" ]; do echo -n pass: read p done # received good password. present a shell bash --noediting -i When I start this script, it asks me to tell it a password and then waits for connections in the background: jfranken@tp:~$./pershd 1234 pass:secret jfranken@tp:~$ With this password I can now access my shell from remote hosts: $ nc tp.jfranken.de 1234 pass:secret jfranken@tp:~$ jfranken@tp:~$ exit exit $ Capturing network traffic Sniffing tools like tcpdump, snoop, iptraf or ethereal are quite popular for debugging network applications. But in order to use them, you need to be root. With netcat you can also capture network connections as a normal user: just point your application to a local netcat, which loggs everything and then forwards it to the server. Page: 6
7 To do so, just replace the term PROGRAM in the above mydemon-script with netcat -o /tmp/sniffer. date +%s.$$ tp.jfranken.de 80 and call it with parameter netcat will now create a logfile for each access to that port in your /tmp-directory. For example: After I had opened with my browser, there was the following logfile: $ cat /tmp/sniffer > f f 31 2e 31 0d 0a # GET / HTTP/1.1.. > d e 74 3a 20 4f # User-Agent: Oper > f 36 2e c 69 6e e # a/6.11 (Linux 2. [...] < f 31 2e f 4b 0d # HTTP/ OK. < a a f #.Server: thttpd/ < e d # 2.21b 23apr2001. < a 43 6f 6e e 74 2d a #.Content-Type: t [...] < a 3c 2f d e 0a 3c 2f 48 #.</FRAMESET>.</H < d 4c 3e 0a # TML>. Copying directory trees over some internet With netcat, (gnu)tar and bash, you can copy directory trees from one host to another. The files are transfered compressed and with all their attributes (permissions/modification times). To receive a file, I let netcat listen on port 51330, and redirect it s output to a tar: $ alias receive= nc -vlp tar xzvp $ receive listening on [any] On the sending host you call a shell function, which tars the given files/directories and sends them to port at the receiving host. $ send() { j=$*; tar cpz ${j/%${!#}/} nc -w 1 ${!#} 51330;} $ send dir* tp.jfranken.de For those not familiar with bash-o-magic: ${!#} returns the last parameter (the hostname), ${j/%${!#}/} any others (list of files or directories). Page: 7
8 Usage as portscanner Used like this, netcat will test some host for open ports: nc -vz PARAMETER hostname PORTRANGES Possible values for PARAMETER are: Parameter Meaning -v show the closed ports as well -w <seconds> timeout for connection setup -u udp instead of tcp. Best used together with -w -r try the ports in random order -i <seconds> delay after each tested port Examples for a tcp- and an udp-scan: $ nc -vz [ ] 443 (https) open [ ] 110 (pop3) open [ ] 80 (www) open [ ] 53 (domain) open [ ] 25 (smtp) open [ ] 22 (ssh) open $ $ nc -vz -vur -i 1 -w 2 localhost localhost [ ] 1024 (?) open localhost [ ] 109 (pop2) : Connection refused localhost [ ] 112 (?) : Connection refused localhost [ ] 111 (sunrpc) open localhost [ ] 110 (pop3) : Connection refused localhost [ ] 108 (?) : Connection refused sent 0, rcvd 0 Links to advanced topics The netcat(1) manpage The netcat README file Page: 8
netcat Гарчиг Tuguldur BiBO
netcat Tuguldur BiBO Гарчиг 1. Хэрэглээ 2. Client (Удирдагч)-с холбогдох a. Webserver-тэй холбогдох b. Port дамжуулах c. Ямар Software DNS-Server ажиллаж байгааг мэдэх 3. Server-н өмнөөс
More informationTaken from the README of the netcat source tree, this description sums up the uses of netcat perfectly.
Page 1 of 13 NetCat Tutorial by: Adam Palmer, 0 http://www.securitydocs.com/library/3376 All information provided here is for educational and development purposes only. Neither LearnSecurityOnline nor
More informationTELE301 Lab16 - The Secure Shell
TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationUsing RDP with Azure Linux Virtual Machines
Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationRFC RFC. Configuring FTP Server. FTP Clients
RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,
More informationLINUX ADMINISTRATION TYBSC-IT SEM V
1 LINUX ADMINISTRATION TYBSC-IT SEM V 2 UNIT 4 CHAPTER 1 : INTERNET SERVICES WHAT IS AN INTERNET SERVICE? Internet Service can be defined as any service that can be accessed through TCP/IP based networks,
More informationChange Management: DYNAMIC NETWORK MAPPING. LinuxWorld San Francisco Security Track. Presented by Joshua D. Abraham.
Change Management: DYNAMIC NETWORK MAPPING LinuxWorld San Francisco Security Track Presented by Joshua D. Abraham August 16th 2006 jabra@ccs.neu.edu Northeastern University Agenda How do we scan? What
More informationLink Gateway Initial Configuration Manual
Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationBasic Linux Command Line Interface Guide
This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting
More informationNetcat Scanning to Backdoors
Netcat Scanning to Backdoors Security & Privacy on the Internet (03-60-467) Fall 2009 Submitted to Dr. A.K. Aggarwal Submitted By Jeffrey Kurcz School of Computer Science University of Windsor CONTENTS
More informationCENG 334 Computer Networks. Laboratory I Linux Tutorial
CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationLinux Networking: network services
Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process
More informationIntroduction to using Netcat
Introduction to using Netcat Objectives To learn basic features of Netcat that using in security field. Introduction : Netcat is a wonderfully versatile tool which has been dubbed the hackers' Swiss army
More informationBasic Linux Command Line Interface Guide
This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting
More informationSecure SHell Explained!
Open Gurus How To Secure SHell Explained! Here re some insights into SSH (Secure Shell), an essential tool for accessing remote machines. S SH is used to access or log in to a remote machine on the network,
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationUNIX COMMANDS AND SHELLS. UNIX Programming 2015 Fall by Euiseong Seo
UNIX COMMANDS AND SHELLS UNIX Programming 2015 Fall by Euiseong Seo What is a Shell? A system program that allows a user to execute Shell functions (internal commands) Other programs (external commands)
More informationInternet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP
Web Programming - 2 (Ref: Chapter 2) TCP/IP Basics Internet Architecture Client Server Basics URL and MIME Types HTTP Routers interconnect the network TCP/IP software provides illusion of a single network
More informationProduced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar
Mobile Application Development Higher Diploma in Science in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie) Department of Computing, Maths & Physics Waterford Institute of Technology
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationHTTP Server Application
1 Introduction You are to design and develop a concurrent TCP server that implements the HTTP protocol in the form of what is commonly called a web server. This server will accept and process HEAD and
More informationSHELL Hacking. 阿里云 - wzt
SHELL Hacking 阿里云 - wzt When control a unix-like system, Than? [root@localhost fucking_rootkit]# ls Makefile furootkit.c [root@localhost fucking_rootkit]# make make -C /lib/modules/2.6.32/build M=/root/lkm/fucking_rootkit
More informationPractical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February
Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends
More informationIntroduction to the shell Part II
Introduction to the shell Part II Graham Markall http://www.doc.ic.ac.uk/~grm08 grm08@doc.ic.ac.uk Civil Engineering Tech Talks 16 th November, 1pm Last week Covered applications and Windows compatibility
More informationScratchbox Remote Shell
Scratchbox Remote Shell Timo Savola tsavola@movial.fi Scratchbox Remote Shell by Timo Savola Copyright 2004, 2005 Nokia Revision history Version: Author: Description: 2005-02-08 Savola Based on Device
More informationAddresses, Protocols, and Ports Reference
APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types
More informationThe Swiss Army Knife netcat
The Swiss Army Knife netcat Lab Objectives In this lab, you will perform the following six labs: Lab 1 Use Netcat for Port Scanning Lab 2 Use Netcat for Banner Grabbing Lab 3 Use Netcat to Transfer Files
More informationRelay Proxy User Guide
Relay Proxy User Guide DBL Technology Company Limited www.dbltek.com sales@dbltek.com support@dbltek.com 2016/5/30 Relay Proxy Relay Proxy is a server software developed by DBL Technology. Its main purposed
More informationEssentials for Scientific Computing: Bash Shell Scripting Day 3
Essentials for Scientific Computing: Bash Shell Scripting Day 3 Ershaad Ahamed TUE-CMS, JNCASR May 2012 1 Introduction In the previous sessions, you have been using basic commands in the shell. The bash
More informationUsing bash. Administrative Shell Scripting COMP2101 Fall 2017
Using bash Administrative Shell Scripting COMP2101 Fall 2017 Bash Background Bash was written to replace the Bourne shell The Bourne shell (sh) was not a good candidate for rewrite, so bash was a completely
More informationMore Raspian. An editor Configuration files Shell scripts Shell variables System admin
More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make
More informationFigure 1: Graphical representation of a client-server application
CS/EE 145a : Networking Lab #1 http://www.its.caltech.edu/ eecs145/ Due: October 24, 2007 1 Introduction The development of network-based software has been around for many years. Since its conception,
More informationCS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 24 th class; 11 th Nov 2011 Instructor: Sridhar Iyer IIT Bombay Layering: physical communication data application transport network link physical application
More informationLecture 08: Networking services: there s no place like
Lecture 08: services: there s no place like 127.0.0.1 Hands-on Unix system administration DeCal 2012-10-15 1 / 22 About Common records Other records 2 / 22 About About Common records Other records Domain
More informationPenetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security No part of this publication, in whole or in part, may
More informationExim Practical. Patrick Okui. (based on materials from Brian Candler)
Exim Practical Patrick Okui (based on materials from Brian Candler) Objectives Part 1 is building and installing Exim.. Install Exim from ports. Replace Sendmail with Exim Part 2 is running basic tests.
More information5. Write a capture filter for question 4.
Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationAfNOG 2003 Exim Practical
AfNOG 2003 Exim Practical Objectives Part 1 is building Exim from source, and installing it. Download Exim source and documentation Unpack the source and documentation Build Exim from the generic distribution
More informationThis material is based on work supported by the National Science Foundation under Grant No
This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the
More informationCOMP 4/6262: Programming UNIX
COMP 4/6262: Programming UNIX Lecture 12 shells, shell programming: passing arguments, if, debug March 13, 2006 Outline shells shell programming passing arguments (KW Ch.7) exit status if (KW Ch.8) test
More informationExim Practical. Part 2 is running basic tests. You don t need to modify the Exim configuration to do this.
Exim Practical Objectives Part 1 is building Exim from source, and installing it. Download Exim source and documentation Unpack the source and documentation Build Exim from the generic distribution Install
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationApplication Layer. Applications and application-layer protocols. Goals:
Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications
More informationServices and Security
Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html
More informationInformation Network Systems The application layer. Stephan Sigg
Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012
More informationThe Unix Shell & Shell Scripts
The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationContents: 1 Basic socket interfaces 3. 2 Servers 7. 3 Launching and Controlling Processes 9. 4 Daemonizing Command Line Programs 11
nclib Documentation Release 0.7.0 rhelmot Apr 19, 2018 Contents: 1 Basic socket interfaces 3 2 Servers 7 3 Launching and Controlling Processes 9 4 Daemonizing Command Line Programs 11 5 Indices and tables
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More informationApplied Networks & Security
Applied Networks & Security Applications http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1 HTTP/HTTPS The language of the
More informationTCP/IP Attack Lab. 1 Lab Overview. 2 Lab Environment. 2.1 Environment Setup. SEED Labs TCP/IP Attack Lab 1
SEED Labs TCP/IP Attack Lab 1 TCP/IP Attack Lab Copyright c 2006-2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation under Award
More informationWEB TECHNOLOGIES CHAPTER 1
WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationGetting Started with MySQL
A P P E N D I X B Getting Started with MySQL M ysql is probably the most popular open source database. It is available for Linux and you can download and install it on your Linux machine. The package is
More informationFoundations of Python
Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the
More informationLinux Fundamentals (L-120)
Linux Fundamentals (L-120) Modality: Virtual Classroom Duration: 5 Days SUBSCRIPTION: Master, Master Plus About this course: This is a challenging course that focuses on the fundamental tools and concepts
More informationMP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm
MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm Please read all sections of this document before you begin coding. In this assignment, you will implement a simple HTTP client and server. The client
More informationCSE 15L Winter Midterm :) Review
CSE 15L Winter 2015 Midterm :) Review Makefiles Makefiles - The Overview Questions you should be able to answer What is the point of a Makefile Why don t we just compile it again? Why don t we just use
More informationTable of Contents. Table of Contents License server installation guide - Linux. Download SCL
Table of Contents Table of Contents License server installation guide - Linux Download SCL Download Synopsys Installer Install SCL - RHEL and CentOS Install SCL - Debian and Ubuntu Customizing the License
More informationCS 460 Linux Tutorial
CS 460 Linux Tutorial http://ryanstutorials.net/linuxtutorial/cheatsheet.php # Change directory to your home directory. # Remember, ~ means your home directory cd ~ # Check to see your current working
More informationagility17dns Release latest Jun 15, 2017
agility17dns d ocsdocumentation Release latest Jun 15, 2017 Contents 1 Lab Access 1 2 Network Topology 3 3 GSLB 5 3.1 Initial Setup............................................... 5 3.2 Logging..................................................
More informationUseful Unix Commands Cheat Sheet
Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List
More informationIllustrated Steps to create greggroeten.net with AWS
Illustrated Steps to create greggroeten.net with AWS Screenshots of each step Table of Contents 1. CREATE VPC 10.10.0/16.... 3 2. CREATE 1 PUBLIC SUBNET IN DEFAULT AZ, EX BELOW... 4 3. CREATE IGW, ATTACH
More informationXcalar Installation Guide
Xcalar Installation Guide Publication date: 2018-03-16 www.xcalar.com Copyright 2018 Xcalar, Inc. All rights reserved. Table of Contents Xcalar installation overview 5 Audience 5 Overview of the Xcalar
More informationMastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK
Mastering Linux Paul S. Wang CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an Imprint of the Taylor & Francis Croup an informa business A CHAPMAN St HALL BOOK Contents Preface
More informationIntro to Linux. this will open up a new terminal window for you is super convenient on the computers in the lab
Basic Terminal Intro to Linux ssh short for s ecure sh ell usage: ssh [host]@[computer].[otheripstuff] for lab computers: ssh [CSID]@[comp].cs.utexas.edu can get a list of active computers from the UTCS
More information9.2 Linux Essentials Exam Objectives
9.2 Linux Essentials Exam Objectives This chapter will cover the topics for the following Linux Essentials exam objectives: Topic 3: The Power of the Command Line (weight: 10) 3.3: Turning Commands into
More information1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions
1Z0-409 Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-409 Exam on Oracle Linux Fundamentals (Oracle Partner Network)... 2 Oracle
More informationIntroduction to remote command line Linux. Research Computing Team University of Birmingham
Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments
More informationBitnami Coppermine for Huawei Enterprise Cloud
Bitnami Coppermine for Huawei Enterprise Cloud Description Coppermine is a multi-purpose, full-featured web picture gallery. It includes user management, private galleries, automatic thumbnail creation,
More informationExim Practical. (based on materials from Brian Candler)
Exim Practical (based on materials from Brian Candler) Objectives Part 1 is building and installing Exim. Install Exim from ports Replace Sendmail with Exim Part 2 is running basic tests. You don t need
More informationDeploying Rubrik Datos IO to Protect MongoDB Database on GCP
DEPLOYMENT GUIDE Deploying Rubrik Datos IO to Protect MongoDB Database on GCP TABLE OF CONTENTS INTRODUCTION... 1 OBJECTIVES... 1 COSTS... 2 BEFORE YOU BEGIN... 2 PROVISIONING YOUR INFRASTRUCTURE FOR THE
More informationIntroduction to using Netcat
Introduction to using Netcat Objectives To learn basic features of Netcat that using in security field. Introduction Netcat is a computer networking service for reading from and writing network connections
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More informationUnix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University
Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )
More informationConfiguring OpenVPN on pfsense
Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Posted by Glenn on Dec 29, 2013 in Networking 0 comments In this article I will go through the configuration of OpenVPN on the pfsense platform.
More informationIntroduction to UNIX Command Line
Introduction to UNIX Command Line Files and directories Some useful commands (echo, cat, grep, find, diff, tar) Redirection Pipes Variables Background processes Remote connections (e.g. ssh, curl) Scripts
More informationNetworks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35
Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet
More informationLinux Systems Administration Shell Scripting Basics. Mike Jager Network Startup Resource Center
Linux Systems Administration Shell Scripting Basics Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationwritten by ssh Nikkei Linux
written by ssh Nikkei Linux 2000.12 149 shell stream tcp nowait root /usr/sbin/tcpd in.rshd login stream tcp nowait root /usr/sbin/tcpd in.rlogind # ssh if [ -x /usr/sbin/sshd ] then /usr/sbin/sshd fi
More informationHow Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationSECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System
SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported
More informationCS214 - Advanced UNIX
CS214 - Advanced UNIX Lecture 10 - Networking continued. Documents Uses material from Ymir Vigfusson The Python Documentation (http://docs.python.org) CS214 p. 1 Privileges Recall that UNIX has a superuser
More informationsottotitolo A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi
Titolo presentazione Piattaforme Software per la Rete sottotitolo BASH Scripting Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi Outline 1) Introduction to BASH 2) Helper commands 3) Control Flow
More information7 Distributed File Systems
Single tree /etc Global File system /progs Drives mounted over the network to create a single tree /user /sys Network Forest of drives 7 Distributed File Systems C: D: E: F: Drives mounted over the network
More information6.1. Getting Started Guide
6.1 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
More informationLecture # 2 Introduction to UNIX (Part 2)
CS390 UNIX Programming Spring 2009 Page 1 Lecture # 2 Introduction to UNIX (Part 2) UNIX is case sensitive (lowercase, lowercase, lowercase) Logging in (Terminal Method) Two basic techniques: 1. Network
More informationEnvironment Variables
Environment Variables 1 A shell is simply a program that supplies certain services to users. As such, a shell may take parameters whose values modify or define certain behaviors. These parameters (or shell
More informationTELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More information